[0001] The invention relates to a three-layer digital asset management system and a method
to operate thereof. The invention also relates to a central unit and a service provider
unit within the three-layer digital asset management system.
[0002] To use a service or a resource, a user (participant) may need to present an authorization
and/or an identification. For such purposes, access control lists may be used. Such
access control lists are potentially large, or they may need to always be connected
to a network to access a central server.
[0003] Conventionally, there are role-based access control systems, short RBAC, which are
centralized systems. These RBACs hold information about each user to perform certain
tasks or map certain rights relating to the user of the role-based access control
system. The RBACs also protect access to other resources to which the user does not
have access rights, e.g. application programming interfaces, short APIs, that enable
changes in security features.
[0004] Usually, RBACs are used as follows: When a user or its respective user unit requests
a certain function (which may run under a corresponding API), this function asks the
RBAC what this requesting user is allowed to execute. The RBAC transmits a response
which either allows the execution of the requested function or not.
[0005] Disadvantageously, the requesting user or its respective requesting unit does not
know its roles and therefore it does not know its permissions, because this information
is stored centralized in the RBAC. On the other hand, the function being requested
needs to call an external system to ask what kind of roles the user has for deciding
if the user can execute the function or not.
[0006] It is an object of the present invention to provide a network system with interacting
units that have different security levels. It is a further object that processes,
network services and/or system functions can be requested securely and stably, while
data can also be transmitted securely and anonymously. It is a further object that
modified requirements regarding enhanced security features in the network system can
be adapted easily without increasing management and computing effort.
[0007] This object is solved by the features of the independent claims. The respectively
dependent claims concern preferred and advantageous implementations.
[0008] In a first aspect, a central unit within a three-layer digital asset management,
short TLDAM, system is provided.
[0009] A TLDAM system may be a closed network system or an extendable network system for
an unrestricted number of requesting units performing tasks or roles within one or
more of the three layers in the TLDAM system. The TLDAM system comprises at least
three layers and can also have four or more layers. Each layer is a hardware and/or
software layer that comprises one or more of the requesting units. Each requesting
unit may perform an inter-layer-communication and/or an intra-layer-communication
within the TLDAM system. The network topology and/or network structure of the TLDAM
system is not restricted.
[0010] The TLDAM system may be related to digital assets. Digital assets include but are
not exclusive to digital documents, audible content, motion picture, and other relevant
digital data that are currently in circulation or are, or may be stored on requesting
units. Preferably, the digital asset is a token. Tokens may represent central bank
digital currency, short CBDC, and their asset may be a monetary value. The digital
asset may also include cryptocurrency assets.
[0011] The TLDAM network system may be implemented on a plurality of servers; each configured
to execute network related tasks.
[0012] The central unit of the TLDAM system represents a first layer within the TLDAM system.
The central unit may be used to administrate, manage and/or control the operation
of the TLDAM system. The central unit may be used to control and monitor inter-layer-communication
and/or intra-layer-communication within the TLDAM system.
[0013] The central unit may be implemented as a server within a client-server architecture,
e.g., the clients being requesting units within the TLDAM system. The central unit
may be implemented as a software application executable only within other software
applications. The central unit may be realized as an online database to which other
units in the TLDAM system may have access via an internet connection, such as TCP,
IP, HTTPS or other suitable means. The central unit may be a master in a master-slave
environment. The central unit may be a peer in a peer-to-peer TLDAM system.
[0014] The central unit of the TLDAM system comprises a receiving unit which is configured
to receive a request of one or more requesting units of the TLDAM system.
[0015] A requesting unit is a unit within any of the at least three layers in the TLDAM
system. The requesting unit may be a service provider unit, such as an electronic
payment provider unit like a commercial credit institution, a corporate bank, and/or
a private bank. etc. The requesting unit may be a transaction unit assigned to a participant
or user within the TLDAM system. The transaction unit may be assigned to a natural
or legal person to interact with the TLDAM system. The transaction unit may be a secure
wallet within an electronic payment transaction system. A requesting unit may be a
unit within the central unit, too.
[0016] A requesting unit may be a unit other than a central unit and/or other than a service
provider unit.
[0017] Several requesting units having identical or having different security features may
be provided within the TLDAM system. A requesting unit may be implemented as a secure
transaction unit which sends requests to the central unit and receives responses from
the central unit. The requesting unit may be one or more service provider units and/or
one or more transaction units (participant units).
[0018] The received request may include at least two certificates, executable functions,
demanded network services and/or commands. The request may include one or more tokens
to be transferred, to be registered, or to be monetarized or to be protocolled or
to be deleted or to be generated.
[0019] The request may include a request to or from a specific requesting unit for managing
the or another requesting unit, such as loading or unloading of balance within the
requesting unit, loading or unloading of requesting units within a service provider
unit and so on.
[0020] The receiving unit within the central unit may be implemented as a transceiver or
modem configured to receive the request from the requesting unit(s). The receiving
unit may be configured to receive the requests sequentially and/or parallel. The receiving
unit may be configured to forward (redirect) the request to a verifying unit within
the central unit.
[0021] A verifying unit is arranged within the central unit of the TLDAM system. The verifying
unit is configured to verify at least two certificates of the one or more requesting
units; to generate a verification result, the verification result being an approval
or a denial of the request of the one or more requesting units; to allow the execution
of the request in case, the verification result from the verifying unit is the approval;
and to block the execution of the request in case, the verification result from the
verifying unit is the denial.
[0022] So, the verifying unit can interpret all received requests mainly to verify them
instantly upon reception by means of proving at least two certificates which are part
of a received request as sent by one or more requesting units. After interpreting
the received request, a verification result is generated by the verification unit.
[0023] The verification result can be positive, meaning that the verification result is
an approval of the request. The approval may be a permission to read data, to receive
data, to execute network administration functions and other tasks for the requesting
unit within the TLDMA system. The execution of the request is allowed in case, the
verification result from the verifying unit is the approval.
[0024] The verification result can be negative, meaning that the verification result is
a denial of the request. The denial may result in that no data transmission, or no
performance of the requested function is carried out. The execution of the request
is blocked in case, the verification result from the verifying unit is the denial.
[0025] Each request comprises at least two (digital) certificates. The certificates are
different from each other. In cryptography, a digital certificate is an electronic
document used to prove the validity of a public key of a PKI key pair. The certificate
may include information about the public key, information about the identity of the
certificate holder (participant, user), and a digital signature of an entity that
has verified the certificate's contents. The entity is also called certificate issuer,
which may be a certificate authority, short CA.
[0026] A first certificate of the at least two certificates (of the request) is an identification
certificate of the requesting unit. This first certificate may provide the central
unit with a trustworthy identity for a successful authentication of the requesting
unit as a first requirement for permission of the request from the requesting unit.
[0027] A second certificate of the at least two certificates (of the request) is an attribute
certificate for the request. Attribute certificates are electronic documents containing
attributes associated to the requesting unit (assigned to a user, certificate holder)
of the attribute certificate. The attribute certificate is preferably issued and managed
by the central unit. The attribute certificate gives permission to the requesting
unit to execute the request (e.g. a function) within the TLDAM system, such as access
control, identification, authentication, encryption, receiving information. When associated
attributes are mainly used for the purpose of authorization, an attribute certificate
is called an authorization certificate.
[0028] This second certificate may be used to signal a specific role or permission of the
requesting unit within the TLDAM system. So, it may permit defined actions for the
requesting unit - this unit being firstly identified and authenticated by the first
certificate. A role or defined action of such a requesting unit may be related to
a security level, which the requesting unit may have.
[0029] This central unit enables an easier and faster verification of permissions of requesting
units. The attribute certificates managed by the central unit are part of each request
and so, each requesting unit is aware of its own role, and permissions.
[0030] With the inventive approach, the requesting unit provides an attribute certificate
as the second certificate together with its request to execute a certain function.
This second certificate is trusted because it was issued by the central unit which
is considered to be a trusted party in the TLDAM system.
[0031] In this case the execution of the function can be controlled by inspecting and verifying
the certificate if the user is identified and authorized. Alternatively, the execution
of the function is blocked if the user cannot be identified or authorized. Changing
the role of a requesting unit may lead to revocation of at least one of the second
certificate. To withdraw a specific role from the requesting unit, merely the revocation
of the second (attribute) certificate is necessary. So, administration of a requesting
unit within the TLDAM system is enhanced and much easier. Management of certificate
revocation lists is no longer needed.
[0032] In a preferred embodiment, the central unit further comprises a transmitting unit
which is configured to send the denial to the requesting unit or to send the approval
to the requesting unit. The transmitting unit may be implemented as hardware like
a digital signaling processor and/or as software like an applet or a plug-in applet.
Transmitting unit and receiving unit of the central unit may be combined as a transceiver
unit. With sending the denial, the requesting unit is promptly informed that the request
is not granted or executable.
[0033] In a preferred embodiment, for verifying the at least two certificates, the verifying
unit is further configured to receive and to read the first certificate for verifying
the identity of the requesting unit. So, the verifying unit may verify the at least
two certificates upon receiving and reading. After reading the first certificate,
the identity of the requesting unit may be verified or declared as invalid.
[0034] In a preferred embodiment, for verifying the two certificates, the verifying unit
is further configured to receive and read the second certificate for verifying the
authorization of the requesting unit, wherein the authorization is an access to one
or more sub-units within the central unit. So, the verifying unit may read the second
certificate for verifying the authorization certificate of the requesting unit to
authorize the request.
[0035] Preferably, after verifying the first certificate for performing the identity check,
the second certificate is verified for performing the authorization check. Advantageously
both certificates may be received within the same (one) request or message and may
be read in immediate succession. The verified authorization may result in granting
access to one or more sub-units within the central unit.
[0036] In a preferred embodiment, the central unit may comprise an attribute manager. The
attribute manager may be implemented as software or hardware. The attribute manager
is configured to issue the second certificate to be verified by the verifying unit
upon receiving requests by one or more requesting units. The issuing may be performed
upon detecting an issuing condition.
[0037] An issuing condition may be the fulfilment of one or more security requirements of
the requesting unit. A security requirement may be a security level of a hardware
for the requesting unit, such as a secure storage unit, a trusted execution environment
or another certified unit enhancing or assuring a level of trust. A security requirement
may be the execution of a specific secure application and/or software, e.g. a predefined
version of a specific software.
[0038] An issuing condition may be an authorization level required for accessing a unit
in the TLDAM system. The authorization level may be a level within a hierarchy of
the units in the TLDAM system. For instance, a service provider unit in the TLDAM
system may have a higher authorization level than a transaction unit of a participant.
For example, a service provider unit may be allowed to receive information about a
transaction unit status or about tokens residing in the transaction unit, whereas
a transaction unit is permitted to receive such information.
[0039] The attribute manager is alternatively or additionally configured to revoke the second
certificate upon detecting a revocation condition.
[0040] The revocation condition may be a fraud detection, e.g., a stolen certificate, a
duplicated certificate, a modified certificate and/or a fraud behavior of the requesting
unit, such as a high number of requests within a short time or a too high amount of
monetary value requested to be transferred.
[0041] The revocation condition may be an expiration of the second certificate, e.g. an
expiry date or time is achieved or overshoot.
[0042] The revocation condition may be a malfunction of the requesting unit, such as a software
failure or bad transmission conditions or high number of lost or damaged data packages
or irresponsiveness of the requesting unit.
[0043] The revocation condition may be a time-out of requests to be responded by the requesting
unit having the second certificate revoked. It may be implemented that a plurality
of time-outs, e.g., a predefined number such as 3, 5 or 10 time-outs, result in the
revocation of the requesting unit, because the trustworthiness is lost.
[0044] The revocation condition may be an increase of a security level of the TLDAM system.
For instance, a higher level of security level is implemented in the TLDAM system,
the requesting units may per default need to apply for new second certificates and
the older second certificates are automatically revoked to fulfill the security level.
[0045] The revocation condition may be a decrease of a security level of the requesting
unit, for instance, if a requesting unit is considered as not trustworthy due to older
hardware and/or software standards.
[0046] In a preferred embodiment, the central unit may further comprise a public-key-infrastructure,
PKI, - Certification manager configured to issue the first certificate to be verified
by the verifying unit. The PKI certification manager may also be configured to revoke
the first certificate upon fraud detection. The certificate manager as part of the
central unit reduces administrative effort such as overhead and/or control data as
well as computational effort in the TLDAM system.
[0047] In a preferred embodiment, the central unit may further comprise one or more requested
sub-units, wherein for each sub-unit the execution of the request is allowed or is
blocked based on the verification result. The one or more sub-units provide services
requested by the one or more requesting units. A requested sub-unit is a unit, to
which the request by the requesting unit is directed to.
[0048] In a preferred embodiment, based on the verification result reading access to the
one or more requested sub-units is allowed or blocked. The allowance of the request
is based on the verification result as issued by the verifying unit. A reading access
for the requesting units may be allowed or blocked by the requested units according
to the verification result as set and/or determined by the verifying unit. A reading
access is an access - if granted - to read data from a requested unit or sub-unit
upon request.
[0049] In a preferred embodiment, the one or more sub-units of the central unit may be a
token reference register sub-unit to register, deregister token that are exchanged
in the TLDAM system.
[0050] In a preferred embodiment, the one or more sub-units of the central unit may be a
system monitoring sub-unit, e.g. for fraud detection and/or system performance surveillance.
[0051] In a preferred embodiment, the one or more sub-units of the central unit may be a
resolution manager sub-unit, e.g. for prioritizing requests and/or resolving conflicting
results.
[0052] The one or more sub-units may provide internal services as requested by the token
reference register and/or the system monitoring sub-unit and/or the resolution manager
sub-unit.
[0053] The one or more sub-units like token reference register and/or the system monitoring
sub-unit and/or the resolution manager sub-unit may provide external services as requested
by the requesting units like service provider units and/or participant units.
[0054] In another aspect, there is provided a service provider unit being a requesting unit
within the TLDAM system. The service provider unit comprises a transmitting unit,
which is configured to send a request to a central unit as described above.
[0055] The service provider unit further comprises a control unit. The control unit is configured
to access at least two certificates. These certificates may be local or inside or
outside the TLDAM system.
[0056] A first certificate of the at least two certificates is an identification certificate
of the service provider unit, and a second certificate of the at least two certificates
is an authorization certificate of the service provider unit.
[0057] The service provider unit also comprises a receiving unit configured to receive data
related to the request from the central unit only in case the request is approved
by the central unit. So, the data is sent by the central unit towards the service
provider unit only in case the request is approved by the central unit via the verifying
unit. In case of a blocked request a denial message is sent to the requesting unit.
Data transmission or execution of a function is omitted then.
[0058] In a preferred embodiment, the service provider unit is a financial service provider
unit and/or a smart contract service provider unit and/or an exchange service provider
unit. Each of them is configured to send requests and receives responses to/from the
central unit and/or other requesting units within the TLDAM system. For example, a
financial service provider may notify the issuance of a requesting unit (e.g., a transaction
unit, such as a secure wallet) for a participant who has just subscribed to the service
of the TLDAM system.
[0059] In a preferred embodiment, the service provider unit may be configured to send a
request that comprises the at least two certificates to the central unit. This request
administrates one or more other requesting units being a different service provider
unit or/ and being one or more participants within the TLDAM system.
[0060] In a preferred embodiment, the service provider unit is configured to communicate
with one or more requested sub-units of the central unit directly or indirectly upon
approval. The approval as result of a certificate verification as carried out by a
verifying unit of the central unit is sent by the transmitting unit of the central
unit afterwards.
[0061] In another aspect, there is provided a TLDAM system that comprises a central unit
as described above and one or more requesting units. The one or more requesting units
comprises one or more service provider units as described above and one or more participant
units.
[0062] In a preferred embodiment, the one or more requesting units are implemented as a
secure transaction unit of the one or more service provider units or a wallet in the
TLDAM system.
[0063] In another aspect, there is provided a method to operate the TLDAM system as described
above.
[0064] In the following, the invention or further embodiments and advantages of the invention
are explained in more detail based on drawings, wherein the drawings describe only
embodiments of the invention. Identical components in the drawings are given the same
reference signs. Elements drawn with dashed lines are considered as optional elements.
[0065] The drawings are not to be regarded as true to scale, and individual elements of
the drawings may be shown in exaggeratedly large or exaggeratedly simplified form.
Fig. 1 shows a conventional network including a RBAC system and two clients.
Fig. 2 shows an exemplary embodiment of a TLDAM system according to the invention
mapped to the system components of the conventional network according to Fig. 1.
Fig. 3 shows an exemplary embodiment of a TLDAM system according to the invention.
Fig. 4 shows an exemplary embodiment of a central unit within a TLDAM system according
to the invention.
Fig. 5 shows an exemplary embodiment of a service provider units within a TLDAM system
according to the invention.
Fig. 6 shows an exemplary embodiment of a service provider unit interacting with a
central unit within a TLDAM system according to the invention.
Fig. 7 shows an exemplary embodiments of participant pcp units in a TLDAM system according
to the invention.
[0066] Fig. 1 shows a conventional network including a RBAC system and client A and client
B. Both clients A, B use an eID PKI Suite software. This PKI suite software issues
iss only one certificate for each client. Client A and client B each sends or transmits
a request req to a gateway GW. The request req includes a certificate which identifies
the transmitting client and further includes a service request corresponding to a
task to be executed.
[0067] The gateway GW checks if the certificates in the requests req are valid by applying
an online certificate status protocol OCSP which corresponds to a certification revocation
list, CRL.
[0068] In case of a certificate, which is not listed by the CRL, the gateway GW forwards
fwd the now validated request req to an application programming interface API provided
with protected access which results in an access only for authenticated clients having
a validated or verified ID certificate. The application programming interface API
then transmits the request req as extracted from the message containing the request
req to a role-based access control system RBAC which checks the role of the client
A or client B and gives permission or denies permission.
[0069] The requested service or task in the request req is only executed if the role of
client A or client B - as stored in the role-based access control register - is authorized
to do this task. In case the requesting unit, here client A respectively client B,
is not given permission by the RBAC system to execute the requested task as provided
with the API.
[0070] Disadvantageously, this conventional network system as shown in Fig. 1 needs the
RBAC as a network component being implemented as a database which has to check and
verify each arriving request in case of a successful authentication of client A or
client B.
[0071] Checking and verifying each certificate of a request results in an extended volume
of control data traffic occupying network resources which cannot be used for payload
anymore.
[0072] Further on, it is unfavorable to implement a RBAC because the clients usually do
not know their roles and information concerning these roles as stored in the RBAC
system. In case of a system modification there is an effort to adjust modified roles
of the requesting units in the RBAC system.
[0073] Fig. 2 shows an exemplary embodiment of a TLDAM system according to the invention
mapped to the system components of the conventional network according to Fig. 1. As
can be seen in Fig. 2 the TLDAM system according to the invention does not have a
RBAC system.
[0074] The three-layer digital asset management TLDAM system comprises a central unit CU
which includes a receiving unit RU. The receiving unit RU is configured to receive
a request req message of one or more requesting units ReqU, here ReqU1 and ReqU2.
A verifying unit VU of the central unit CU is configured to verify vcert at least
two certificates CA1, CA2 of the one or more requesting units ReqU and subsequentially
generates a verification result vres. This verification result vres may be either
an approval appr or a denial den of the request req as sent by one or more of the
requesting units ReqU.
[0075] In case, the verification result vres from the verifying unit VU is the approval
appr the execution of the service or the tasked included in the request message req
is given permission. The requested service can be provided by the three-layer digital
asset management system or its application programming interface API due to certification
validation vcert without any database query.
[0076] If the verification result vres from the verifying unit VU is the denial den, the
execution of the service or the tasked included in the request message req is blocked
without any database query for the role of the requesting unit ReqU.
[0077] The first certificate CA1 of the two certificates CA1, CA2 as sent by the requesting
unit ReqU is its identification certificate for authenticating the requesting unit
ReqU within the three-layer digital asset management TLDAM system.
[0078] Fig. 2 also shows an eID PKI Suite tool as component of the TLDAM system which is
arranged outside a central unit CU. The eID PKI Suite tool comprises a PKI certificate
manager which issues PKI certificates as first certificates CA1 for each requesting
unit ReqU and further comprising an Attribute Manager 2 which issues attribute certificates
as second certificate CA2 for each requesting unit. Fig. 2 shows the issuing of the
first certificate CA1 for requesting unit ReqU1 by the PKI-Certification Manager 1
and the issuing of the second certificate CA2 for requesting unit ReqU2 by the Attribute
Manager 2. Requesting unit ReqU2 is already a holder of the first certificate CA1.
[0079] The verifying unit VU is further configured read the first certificate CA1 for verifying
the identity of the requesting unit ReqU1 or ReqU2 by verifying vcert the first certificate
CA1 for authentication.
[0080] The second certificate CA2 of the two certificates CA1, CA2 is an authorization certificate
for the request req of the requesting unit ReqU, here ReqU2. The authorization certificate
gives access permission to the requesting unit ReqU2 to any service as defined by
the application programming interface API. The verifying unit VU is further configured
to receive the second certificate CA2 which was extracted previously from the request
req message as sent by a requesting unit ReqU2. Now, the second certificate is read
by the verification unit VU to verify an authorization of the requesting unit ReqU
to get access to one or more sub-units 3 which may be integrated in the central unit
CU.
[0081] The simultaneous validation of both certificates CA1 and CA2 reduces control traffic
within the three-layer digital asset TLDAM system. The amount of payload can be increased
because database queries for authentication and/or authorization are prevented.
[0082] The eID PKI Suite software may be integrated into the central unit CU or may be implemented
as a distributed database like a master of master-slave system, or as a client of
client-server system or as a peer of a peer-to-peer system, which is not a part of
the central unit CU, but a part of the three-layer digital asset management TLDAM
system.
[0083] According to the ITU-T's standardization X.509 standard at least the first certificate
CA1 may be issued by the eID PKI Suite software.
[0084] The eID PKI Suite software may also be applied to issue second certificates CA2.
[0085] Fig. 3 shows an exemplary embodiment of a TLDAM system according to the invention.
The TLDAM system includes the central unit CU, two service provider units SPU as Requesting
Units ReqU1 und ReqU3 and participant units as requesting units ReqU2 and ReqU4, each
are configured to send request messages req to the central unit CU to demand network
services. A financial service provider FSP1 as Requesting unit ReqU1 sends the request
req being received by the receiving unit RU of the central unit CU. This request is
redirected to the verifying unit VU for verifying the at least to certificates CA1
and CA2 included in the request req. The central unit CU further comprises a transmitting
unit TU being configured to send the approval appr or the denial den to the Requesting
unit ReqU, here the requesting units ReqU1 and ReqU2. The verifying unit VU generates
the verification result vres being forwarded to the transmitting unit TU for sending
it to the requesting unit ReqU1. The message vres may be the approval appr or the
denial den of the demanded service. For example, the financial service provider FSP1
may demand information about one or more participant units pcp, which are using the
TLDAM system.
[0086] Fig. 3 also shows a participant unit pcp as a requesting unit ReqU2 sending a request
message and receiving the approval appr or the denial as sent by the transmitting
unit TU of the central unit CU. For example, the participant pcp may execute a wallet
load or a wallet unload service or may apply for a credit.
[0087] The central unit CU as depicted in Fig. 3 also comprises at least three sub-units
3. Based on the verification result vres as set up by the verification unit VU an
access of a requesting unit ReqU to these sub-units may be either blocked or allowed.
[0088] One sub-unit 3 may be a token reference register TRR 3a for the administration of
Tokens, whereas a second sub-unit 3 may be a system monitoring sub-unit 3b for fraud
detection. A third sub-unit 3 may be a resolution manager 3c which priories requests
and/or resolves conflicting results or conflicting messages. The number of sub-units
3 is not restricted. The central unit CU may also comprise 4 or more sub-units 3.
[0089] Fig. 4 shows an exemplary embodiment of a central unit CU within a TLDAM system according
to the invention. The TLDAM includes an embodiment of the central unit CU which comprises
a plurality of additional and/or optional sub-units 3.
[0090] A token- or account-register TRR sub-unit 3a may be implemented within in the central
unit CU or may also be implemented outside. Fig. 4 shows the plurality of sub-units
3 being integrated within the central unit.
[0091] Each modification of an asset or a token as digital currency can be registered by
replacement request messages containing first and/or second certificate CA1, CA2.
For each asset or token a token reference can be stored in the token- or account-register
TRR sub-unit 3a.
[0092] A transaction logging sub-unit PROT 3d may be implemented in the central unit CU
for logging payment transactions between requesting units ReqU.
[0093] A token issuance sub-unit 3e is configured to generate new tokens or assets which
are issued in an electronic transaction system being part of the TLDAM network system.
The token issuance sub-unit 3e is also configured to delete tokens from the electronic
transaction systems.
[0094] A wallet data manager WDM sub-unit 3f and a SP data manager SPDM which are information
storage and retrieval units for wallet-related and SP-related data, respectively.
The wallet data manager WDM sub-unit 3d may contain a Know Your Customer, KYC, system
and may answer ID queries. For example, a participant or user pcp would like to know
his wallet ID. Financial service providers FSPs may also query the wallet ID of users.
Wallet issuance units of a financial service providers FSP may register the creation
of a new wallet or modify existing entries.
[0095] Fig. 5 shows an exemplary embodiment of service provider units SPU within a TLDAM
system according to the invention.
[0096] Each of the illustrated service provider units SPU - not exclusively represented
by financial service providers FSP1 and FSP2 - is provided with the first certificate
CA1 and the second certificate CA2, and with their application programming interfaces
APIs (not shown in Fig. 5). An API may be a wallet load/unload service as requested
by participant pcp units, for example. The requested service as addressed by the API
may also register tokens or assets for other participating units. Further services
as provided by the SPUs are a wallet issuance service, a wallet maintenance service,
and a token volume management service.
[0097] The service provider SPU further comprises a transmitting unit TU' for communicating
with the central unit CU. Further on, a control unit CON is provided, which is configured
to access the at least two certificates CA1 and CA2. The service provider unit SPU
also comprises a receiving unit RU' which is configured to receive data related to
the request req. For example, the central unit sends a monetary value being loaded
by a requesting participant for his digital wallet.
[0098] Besides that, the service provider may also comprise a verifying unit (not) shown
to process authentications and authorizations of users of higher layers, like participants
pcp of layer 3, or different parties of participants of a an extended TLDAM system
having four or five layers.
[0099] A wallet maintenance service may be an administration service carried out for the
participant pcp, for example payment transactions being logged and displayed to provide
this information for the participant.
[0100] A wallet issuing service may be a registration of a new wallet with the central unit
CU. A Token volume management service of the service provider unit SPU may monetarize
a wallet with a certain ID after an approval appr was sent by the central unit CU.
[0101] Further on, the embodiment of the inventive service provider unit SPU as shown in
Fig. 5 may also represented by smart contract services and/or exchange services.
[0102] A smart contract is a kind of an intelligent digital contract based on computer protocols
like the blockchain technology.
[0103] An exchange service supports the service provider units SPUs when monetarized tokens
were transferred to a different country of the requesting unit ReqU. This country
may have a different official or local currency and the exchange service may provide
daily updated exchange rates.
[0104] Fig. 6 shows an exemplary embodiment of a service provider unit SPU interacting with
a central unit CU within a TLDAM system according to the invention.
[0105] The pictured embodiment includes the wallet data manager sub-unit 3d which is involved
for providing financial service as requested by a participant (not shown), who wants
to load his wallet via his financial service provider FSPm. The exemplary embodiment
describes an interaction between the central unit CU as described above and the service
provider unit SPU of Fig. 5. PKI-Certification Manager 1 and Attribute Manager 2 may
both be integrated and implemented within the central unit CU as shown. But they may
both or one of them be arranged outside the central unit CU, too.
[0106] Financial service provider FSPm receives a request req comprising an executable service
"wallet load" and the required certificates CA1 and/or CA2. FSP2 may check the validity
(not shown) of the at least two certificates CA1, CA2 of the req message and either
send an approval appr or a denial den to the requesting unit ReqU (not shown). According
to the invention the at least two certificates CA1 and/or CA2 are preferably be checked
by the verifying unit VU of the central unit. CU.
[0107] After authentication and authorization via checking the validity of the certificate(s)
CA1 and/or CA2 at the financial provider service, here FSP2 a request comprising a
walletfunction "Load wallet of the requesting unit ReqU" is forwarded to the receiving
unit RU of the central unit CU.
[0108] In case the validity according to vres corresponds to a denial, the walletfunction
is blocked and the requesting unit will be notified via the denial message den, the
message "wallet load denied" is delivered.
[0109] Fig. 7 shows an exemplary embodiment of two types of participant units pcp as requesting
units ReqUs. The participant units or wallets may either be issued or hosted by one
or more Financial service provider units FSPs. In the embodiment shown FSP1 issues
two wallets provided with first CA1 and second certificate CA2 each.
[0110] FSP2 issued two wallets each feature only one certificate CA1, respectively CA2.
[0111] The wallets hosted and managed by FSP3 or FSP4 are not issued by them.
Reference List
[0112]
- CU
- Central unit
- TLDAM
- Three-layer digital asset management
- RU
- Receiving unit of CU
- RU'
- Receiving unit of SPU
- req
- Request (message)
- res
- Response (message)
- ReqU
- Requesting unit
- VU
- Verifying unit
- CA1
- Certificate 1 (identification, authentication)
- CA2
- Certificate 2 (attribute)
- appr
- Approval
- den
- Denial
- vcert
- verify certificate
- vres
- verification result
- iss
- issue
- rev
- revoke
- fwd
- forward
- 1
- PKI-Certification Manager
- 2
- Attribute Manager
- 3
- sub-unit
- 4
- smart contract
- 5
- exchange server
- CON
- control unit
- TRR
- Token register
- SysMon
- System Monitoring
- ResMan
- Resolution Manager
- WDM
- wallet data manager
- SPDM
- Service provider data manager
- SPU
- Service Provider Unit
- CON
- control unit of SPU
- Pcp
- Participant unit
- TU
- transmitting unit
- TU'
- transmitting unit
- A
- client A
- B
- client B
- GW
- Gateway
- OCSP
- online certificate status protocol
- API
- Application programming interface
- RBAC
- Role based access control
- eID PKI
- eID PKI Suite Software
1. A central unit (CU) within a three-layer digital asset management (TLDAM) system comprising:
• a receiving unit (RU) configured to receive a request (req) of one or more requesting
units (ReqU) of the three-layer digital asset management system (TLDAM); and
• a verifying unit (VU) configured to:
∘ verify (vcert) at least two certificates (CA1, CA2) of the one or more requesting
units (ReqU);
∘ generate a verification result (vres), the verification result (vres) being an approval
(appr) or a denial (den) of the request (req) of the one or more requesting units
(ReqU);
∘ allowing the execution of the request (req) in case, the verification result (vres)
from the verifying unit (VU) is the approval (appr); and
∘ blocking the execution of the request (req) in case, the verification result (vres)
from the verifying unit (VU) is the denial (den);
• wherein a first certificate (CA1) of the at least two certificates (CA1, CA2) is
an identification certificate of the requesting unit (ReqU); and
• wherein a second certificate (CA2) of the two certificates (CA1, CA2) is an attribute
certificate for the request (req).
2. The central unit (CU) according to claim 1, further comprising a transmitting unit
(TU) configured to send the denial (den) to the requesting unit (ReqU) or to send
the approval (appr) to the requesting unit (ReqU).
3. The central unit (CU) according to claim 1 or 2, wherein for verifying (vcert) the
at least two certificates (CA1, CA2), the verifying unit (VU) is further configured
to receive and to read the first certificate (CA1) for verifying the identity of the
requesting unit (ReqU).
4. The central unit (CU) according to any of the preceding claims, wherein for verifying
(vcert) the two certificates (CA1, CA2), the verifying unit (VU) is further configured
to receive and read the second certificate (CA2) for verifying the authorization of
the requesting unit (ReqU), wherein the authorization is an access to one or more
sub-units (3) within the central unit (CU).
5. The central unit (CU) according to any of the preceding claims, further comprising:
an attribute manager (2), wherein the attribute manager (2) being configured to:
• issue (iss) the second certificate (CA2) to be verified (vcert) by the verifying
unit (VU) upon detecting an issuing condition, wherein the issuing condition being
one or more of the following:
∘ fulfilling of one or more security requirements of the requesting unit (ReqU);
∘ fulfilling an authorization level required for accessing a unit in the three-layer
digital asset management (TLDAM) system;
and/or
• revoke (rev) the second certificate (CA2) upon detecting a revocation condition,
wherein the revocation condition being one or more of the following:
∘ fraud detection;
∘ expiration of the second certificate (CA2);
∘ malfunction of the requesting unit (RU)
∘ time-out of the request to be responded by the requesting unit (RU) having the second
certificate (CA2) revoked;
∘ increase of a security level of the three-layer digital asset management (TLDAM)
system;
∘ decrease of a security level of the requesting unit (ReqU).
6. The central unit (CU) according to one of the preceding claims, further comprising:
a PKI-Certification manager (1) configured to:
• issue (iss) the first certificate (CA1) to be verified by the verifying unit (VU);
and/or
• to revoke (rev) the first certificate (CA1) upon fraud detection.
7. The central unit (CU) according to one of the preceding claims, further comprising
one or more requested sub-units (3) for each sub-unit (3) the execution of the request
(req) is allowed or blocked based on the verification result (vres), wherein the one
or more sub-units (3) provide services requested by the one or more requesting units
(ReqU).
8. The central unit (CU) according to claim 7, wherein based on the verification result
(vres) reading access to the one or more requested sub-units (3) is allowed or blocked.
9. The central unit (CU) according to claim 7 or 8, wherein the one or more sub-units
(3) is one or more of the following:
• a token reference register sub-unit (TRR);
• a system monitoring sub-unit (SysMon); and
• a resolution manager sub-unit (ResMan).
10. A service provider unit (SPU) being a requesting unit (ReqU) within a three-layer
digital asset management (TLDAM) system, the service provider unit (SPU) comprises:
• a transmitting unit (TU'), configured to send a request (req) to a central unit
(CU) according to one of the preceding claims;
• a control unit (CON), configured to access at least two certificates CA1, CA2),
wherein a first certificate (CA1) of the at least two certificates (CA1, CA2) is an
identification certificate of the service provider unit (SPU) and wherein a second
certificate (CA2) of the at least two certificates (CA1, CA2) is an authorization
certificate of the service provider unit (SPU); and
• a receiving unit (RU') configured to receive data related to the request (req) from
the central unit (CU) only in case the request (req) is approved by the central unit
(CU).
11. The service provider unit (SPU) according to claim 10 being a financial service provider
(FSP) unit and/or a smart contract service provider unit (4) and/or an exchange service
provider unit (5), each of them configured to send requests (req) and receives responses
(res) to/from the central unit (CU) and/or other requesting units (ReqU) within the
three-layer digital asset management (TLDAM) system.
12. The service provider unit (SPU) according to claim 10, wherein the request (req, req',
req") to the central unit (CU) is a request for administration of one or more other
requesting units (ReqU) assigned to one or more participants (pcp) within the three-layer
digital asset management (TLDAM) system.
13. The service provider unit (SPU) according any of the preceding claims 10 to 12, configured
to communicate directly or indirectly with one or more requested sub-units (3) of
the central unit (CU) upon approval(appr).
14. A three-layer digital asset management (TLDAM) system comprising:
• a central unit (CU) according to one of the preceding claims 1 bis 9; and
• one or more requesting units (ReqU) comprising:
∘ one or more service provider units (SPU) according to one of the preceding claims
8 to 14; and
∘ one or more participant (pcp) units.
15. A method for operating a three-layer digital asset management (TLDAM) system according
to claim 14.
Amended claims in accordance with Rule 137(2) EPC.
1. A central unit (CU) within a three-layer system comprising:
• a receiving unit (RU) configured to receive a request (req) of one or more requesting
units (ReqU) of the three-layer system; and
• a verifying unit (VU) configured to:
∘ verify (vcert) at least two certificates (CA1, CA2) of the one or more requesting
units (ReqU);
∘ generate a verification result (vres), the verification result (vres) being an approval
(appr) or a denial (den) of the request (req) of the one or more requesting units
(ReqU);
∘ allowing the execution of the request (req) in case, the verification result (vres)
from the verifying unit (VU) is the approval (appr); and
∘ blocking the execution of the request (req) in case, the verification result (vres)
from the verifying unit (VU) is the denial (den);
• wherein a first certificate (CA1) of the at least two certificates (CA1, CA2) is
an identification certificate of the requesting unit (ReqU); and
• wherein a second certificate (CA2) of the two certificates (CA1, CA2) is an attribute
certificate for the request (req);
characterized by
• the three-layer system is a three-layer digital asset management (TLDAM) system
that relates to digital assets, wherein a digital asset preferably is a token representing
a central bank digital currency;
• the verifying unit is further configured to read the second certificate (CA2) for
verifying an authorization of the one or more requesting units (ReqU) to authorize
the request;
• the one or more requesting units (ReqU) are financial service provider (FSP) units.
2. The central unit (CU) according to claim 1, further comprising a transmitting unit
(TU) configured to send the denial (den) to the requesting unit (ReqU) or to send
the approval (appr) to the requesting unit (ReqU).
3. The central unit (CU) according to claim 1 or 2, wherein for verifying (vcert) the
at least two certificates (CA1, CA2), the verifying unit (VU) is further configured
to receive and to read the first certificate (CA1) for verifying the identity of the
requesting unit (ReqU).
4. The central unit (CU) according to any of the preceding claims, wherein for verifying
(vcert) the two certificates (CA1, CA2), the verifying unit (VU) is further configured
to receive and read the second certificate (CA2) for verifying the authorization of
the requesting unit (ReqU), wherein the authorization is an access to one or more
sub-units (3) within the central unit (CU).
5. The central unit (CU) according to any of the preceding claims, further comprising:
an attribute manager (2), wherein the attribute manager (2) being configured to:
• issue (iss) the second certificate (CA2) to be verified (vcert) by the verifying
unit (VU) upon detecting an issuing condition, wherein the issuing condition being
one or more of the following:
∘ fulfilling of one or more security requirements of the requesting unit (ReqU);
∘ fulfilling an authorization level required for accessing a unit in the three-layer
digital asset management (TLDAM) system;
and/or
• revoke (rev) the second certificate (CA2) upon detecting a revocation condition,
wherein the revocation condition being one or more of the following:
∘ fraud detection;
∘ expiration of the second certificate (CA2);
∘ malfunction of the requesting unit (RU)
∘ time-out of the request to be responded by the requesting unit (RU) having the second
certificate (CA2) revoked;
∘ increase of a security level of the three-layer digital asset management (TLDAM)
system;
∘ decrease of a security level of the requesting unit (ReqU).
6. The central unit (CU) according to one of the preceding claims, further comprising:
a PKI-Certification manager (1) configured to:
• issue (iss) the first certificate (CA1) to be verified by the verifying unit (VU);
and/or
• to revoke (rev) the first certificate (CA1) upon fraud detection.
7. The central unit (CU) according to one of the preceding claims, further comprising
one or more requested sub-units (3) for each sub-unit (3) the execution of the request
(req) is allowed or blocked based on the verification result (vres), wherein the one
or more sub-units (3) provide services requested by the one or more requesting units
(ReqU).
8. The central unit (CU) according to claim 7, wherein based on the verification result
(vres) reading access to the one or more requested sub-units (3) is allowed or blocked.
9. The central unit (CU) according to claim 7 or 8, wherein the one or more sub-units
(3) is one or more of the following:
• a token reference register sub-unit (TRR);
• a system monitoring sub-unit (SysMon); and
• a resolution manager sub-unit (ResMan).
10. A service provider unit (SPU) being a requesting unit (ReqU) within a three-layer
digital asset management (TLDAM) system, the service provider unit (SPU) comprises:
• a transmitting unit (TU'), configured to send a request (req) to a central unit
(CU) according to one of the preceding claims;
• a control unit (CON), configured to access at least two certificates (CA1, CA2),
wherein a first certificate (CA1) of the at least two certificates (CA1, CA2) is an
identification certificate of the service provider unit (SPU) and wherein a second
certificate (CA2) of the at least two certificates (CA1, CA2) is an authorization
certificate of the service provider unit (SPU); and
• a receiving unit (RU') configured to receive data related to the request (req) from
the central unit (CU) only in case the request (req) is approved by the central unit
(CU).
11. The service provider unit (SPU) according to claim 10 being a financial service provider
(FSP) unit and/or a smart contract service provider unit (4) and/or an exchange service
provider unit (5), each of them configured to send requests (req) and receives responses
(res) to/from the central unit (CU) and/or other requesting units (ReqU) within the
three-layer digital asset management (TLDAM) system.
12. The service provider unit (SPU) according to claim 10, wherein the request (req, req',
req") to the central unit (CU) is a request for administration of one or more other
requesting units (ReqU) assigned to one or more participants (pcp) within the three-layer
digital asset management (TLDAM) system.
13. The service provider unit (SPU) according any of the preceding claims 10 to 12, configured
to communicate directly or indirectly with one or more requested sub-units (3) of
the central unit (CU) upon approval(appr).
14. A three-layer digital asset management (TLDAM) system comprising:
• a central unit (CU) according to one of the preceding claims 1 bis 9; and
• one or more requesting units (ReqU) comprising:
∘ one or more service provider units (SPU) according to one of the preceding claims
8 to 13; and
∘ one or more participant (pcp) units.
15. A method for operating a three-layer digital asset management (TLDAM) system according
to claim 14.